Business Data Communications Infrastructure Networking and Security 7th Edition Stallings Test Bank
$26.99$50.00 (-46%)
Business Data Communications Infrastructure Networking and Security 7th Edition Stallings Test Bank.
You may also like
Business Data Communications Infrastructure Networking and Security 7th Edition Stallings Test Bank
Product details:
- ISBN-10 : 0133023893
- ISBN-13 : 978-0133023893
- Author: Dr. Thomas L. Case
Business Data Communications: Infrastructure, Networking and Security covers the fundamentals of data communications, networking, distributed applications, and network management and security. These concepts are presented in a way that relates specifically to the business environment and the concerns of business management and staff. While making liberal use of real-world case studies and charts and graphs to provide a business perspective, the book also provides the student with a solid grasp of the technical foundation of business data communications.
Table contents:
- Chapter 0 Reader’s and Instructor’s Guide
- 0.1 Outline of This Book
- 0.2 Topic Ordering
- 0.3 Internet and Web Resources
- 0.4 Useful Publications
- Chapter 1 Introduction
- 1.1 Information and Communication
- 1.2 Data Communications and Networking for Today’s Enterprise
- 1.3 Convergence and Unified Communications
- 1.4 The Nature of Business Information Requirements
- 1.5 The Transmission of Information
- 1.6 Distributed Data Processing
- 1.7 The Internet and Distributed Applications
- 1.8 Networks
- 1.9 Management Issues
- 1.10 Standards
- 1.11 Key Terms, Review Questions, and Problems
- Appendix 1A Prefixes for Numerical Units
- Case Study I Unified Communications at Boeing (ONLINE)
PART ONE REQUIREMENTS
- Chapter 2 Business Information
- 2.1 Audio
- 2.2 Data
- 2.3 Image
- 2.4 Video
- 2.5 Performance Measures
- Application Note: File Sizes
- 2.6 Summary
- 2.7 Key Terms, Review Questions, and Problems
- Case Study II CORE Credit Union (ONLINE)
- Chapter 3 Distributed Data Processing
- 3.1 Centralized Versus Distributed Processing
- 3.2 Forms of Distributed Data Processing
- 3.3 Distributed Data
- 3.4 Networking Implications of DDP
- 3.5 Big Data Infrastructure Considerations
- 3.6 Summary
- 3.7 Key Terms, Review Questions, and Problems
- Case Study III Managing Massive Data Warehouses at MasterCard International (ONLINE)
PART TWO DATA COMMUNICATIONS
- Chapter 4 Data Transmission
- 4.1 Signals for Conveying Information
- 4.2 Transmission Impairments and Channel Capacity
- Application Note: Analog Signals
- 4.3 Summary
- 4.4 Key Terms, Review Questions, and Problems
- Chapter 5 Data Communication Fundamentals
- 5.1 Analog and Digital Data Communications
- 5.2 Data Encoding Techniques
- 5.3 Asynchronous and Synchronous Transmission
- 5.4 Error Detection
- Application Note: Devices, Encoding, Communication Parameters and Protocols
- 5.5 Summary
- 5.6 Key Terms, Review Questions, and Problems
- Chapter 6 Data Link Control and Multiplexing
- 6.1 Flow Control and Error Control
- 6.2 Motivation for Multiplexing
- 6.3 Frequency-Division Multiplexing
- 6.4 Synchronous Time-Division Multiplexing
- Application Note: Changing Communications
- 6.5 Summary
- 6.6 Key Terms, Review Questions, and Problems
- Appendix 6A High-Level Data Link Control Protocol
- Case Study IV Broadband Access: Global and Local Issues (ONLINE)
PART THREE THE INTERNET AND DISTRIBUTED APPLICATIONS
- Chapter 7 The Internet
- 7.1 The Structure of the Internet
- 7.2 Internet Domains
- Application Note: Fitting DNS into your organizational structure
- 7.3 Dynamic Host Configuration Protocol
- 7.4 Summary
- 7.5 Key Terms, Review Questions, and Problems
- Case Study V Net Neutrality (ONLINE)
- Chapter 8 TCP/IP
- 8.1 A Simple Protocol Architecture
- 8.2 The TCP/IP Protocol Architecture
- 8.3 Internetworking
- 8.4 Virtual Private Networks and IP Security
- Application Note: Practical Guide to Networking
- 8.5 Summary
- 8.6 Key Terms, Review Questions, and Problems
- Appendix 8A TCP, UDP, and IP Details
- Appendix 8B The Trivial File Transfer Protocol
- Chapter 9 Client/Server, Intranet, and Cloud Computing
- 9.1 The Growth of Client/Server Computing
- 9.2 Client/Server Applications
- 9.3 Middleware
- 9.4 Intranets
- 9.5 Extranets
- 9.6 Service-Oriented Architecture
- Application Note: To Be Fat or Thin–That is the Question
- 9.7 Cloud Computing
- 9.8 Summary
- 9.9 Key Terms, Review Questions, and Problems
- Case Study VI Shifting Sands: Chevron’s Migration to the Cloud
- Chapter 10 Internet-Based Applications
- 10.1 Electronic Mail
- 10.2 Web Access and HTTP
- 10.3 Web Security
- 10.4 Multimedia Applications
- Application Note: To Serve or Not to Serve?
- 10.5 Acceptable Use Policiess
- 10.6 Summary
- 10.7 Key Terms, Review Questions, and Problems
- Case Study VII E-Business at Guardian Life (ONLINE)
- Chapter 11 Internet Operation
- 11.1 Internet Addressing
- 11.2 Internet Routing Protocols
- 11.3 Multicasting
- 11.4 Quality of Service
- 11.5 Differentiated Services
- 11.6 Service Level Agreements
- 11.7 IP Performance Metrics
- Application Note: Where Does My Network Address Come From?
- 11.8 Summary
- 11.9 Key Terms, Review Questions, and Problems
PART FOUR LOCAL AREA NETWORKS
- Chapter 12 LAN Architecture and Infrastructure
- 12.1 Background
- 12.2 LAN Configuration
- 12.3 Guided Transmission Media
- 12.4 LAN Protocol Architecture
- Application Note: Cabling Infrastructure
- 12.5 Summary
- 12.6 Key Terms, Review Questions, and Problems
- Appendix 12A Decibels and Signal Strength
- Case Study VIII Carlson Companies
- Chapter 13 Ethernet, Switches, and Virtual LANs
- 13.1 Traditional Ethernet
- 13.2 Bridges, Hubs, and Switches
- 13.3 High-Speed Ethernet
- Application Note: Networking with Ethernet
- 13.4 Virtual LANs
- 13.5 Power over Ethernet
- 13.6 Summary
- 13.7 Key Terms, Review Questions, and Problems
- Chapter 14 Wireless LANs
- 14.1 Overview
- 14.2 Wi-Fi Architecture and Services
- 14.3 IEEE 802.11 MAC and Physical Layer Standards
- 14.4 Gigibit WLANs
- 14.5 IEEE 802.11 Security Considerations
- Application Note: Deploying WLANs
- 14.6 Summary
- 14.7 Key Terms, Review Questions, and Problems
- Case Study IX St. Luke’s Health Care System: Using Mobility to Advance Health Care Delivery
PART FIVE WIDE AREA NETWORKS
- Chapter 15 WAN Technology and Protocols
- 15.1 Switching Techniques
- 15.2 Circuit-Switching Networks
- 15.3 Packet-Switching Networks
- 15.4 Traditional Wide Area Network Alternatives
- 15.5 Voice over IP
- 15.6 Presence
- 15.7 Summary
- 15.8 Key Terms, Review Questions, and Problems
- Chapter 16 WAN Services
- 16.1 Wide Area Networking Alternatives
- 16.2 Frame Relay
- 16.3 Asynchronous Transfer Mode (ATM)
- Application Note: Off-site Connectivity Solutions
- 16.4 Multiprotocol Label Switching (MPLS)
- 16.5 Wide Area Ethernet
- 16.6 Summary
- 16.7 Key Terms, Review Questions, and Problems
- Chapter 17 Wireless WANs
- 17.1 Cellular Wireless Networks
- 17.2 Multiple Access
- 17.3 Third-Generation Wireless Communication
- 17.4 Fourth-Generation Wireless Communciation
- 17.5 Satellite Communications
- Application Note: Laptops, Netbooks, PDAs, and Cell Phones
- 17.6 Summary
- 17.7 Key Terms, Review Questions, and Problems
- Case Study X Choice Hotels
PART SIX MANAGEMENT ISSUES
- Chapter 18 Computer and Network Security Threats
- 18.1 Computer Security Concepts
- 18.2 Threats, Attacks, and Assets
- 18.3 Intruders
- 18.4 Malicious Software Overview
- 18.5 Viruses, Worms, Bots, and Spam
- 18.6 Keyloggers, Phishing, Spyware
- 18.7 Computer Security Trends
- 18.8 Key Terms, Review Questions, and Problems
- Chapter 19 Computer and Network Security Techniques
- 19.1 Virtual Private Networks and IPsec
- 19.2 SSL and TLS
- 19.3 Wi-Fi Protected Access
- 19.4 Intrusion Detection
- 19.5 Firewalls
- 19.6 Malware Defense
- Application Note: Security Layers
- 19.7 Key Terms, Review Questions, and Problems
- Case Study XI Cloud Computing (In)Security
- Chapter 20 Network Management (ONLINE)
- Chapter 21 Network Planning and Design (ONLINE)
Appendix A Business Data Communications Projects
- A.1 Animations and Animation Projects
- A.2 Practical Exercises
- A.3 Wireshark Projects
- A.4 Research Projects
- A.5 Security Case Studies
- A.6 Reading/Report Assignments
- A.7 Writing Assignments
Glossary
References
Index
ONLINE CHAPTERS AND APPENDICES[1]
- Chapter 20 Network Management (ONLINE)
- 20.1 Network Management Requirements
- 20.2 Network Management Systems
- 20.3 Simple Network Management Protocol (SNMP)
- Application Note: How Much Management?
- 20.4 Key Terms, Review Questions, and Problems
- Chapter 21 Network Planning and Design (ONLINE)
- 21.1 The Project Environment–The Big Picture
- 21.2 Planning
- 21.3 Design Techniques
- 21.4 Some Capacity Planning and Network Design Tools
- Appendix 21A Some Simple Design Algorithms
- Appendix 21B Selling Books Online–A Case Study
Appendix B Standards Organizations
- B.1 The Importance of Standards
- B.2 Standards and Regulation
- B.3 Standards-Setting Organizations
Appendix C Uniform Resource Locators (URLs) and Uniform Resource Identifiers (URIs)
- C.1 Uniform Resource Locator
- C.2 Uniform Resource Identifier
People also search:
business data communications- infrastructure networking and security 7th edition
business data communications- infrastructure networking and security 7th
business data communications- infrastructure networking and security 7th edition pdf
business data communications- infrastructure networking and security 7th edition pdf free
business data communications- infrastructure networking and security 7th edition download scribd